Appeared Trojans spy on businesses
BitDefender warned of the dangers of a new spy Trojan described by them as " scary rivals ", which can be used as an enterprise scout tool.
Internet Security Specialist BitDefender says that Trojan.Spy.YEK " sniffs " important data and that archives can contain personal information and send them to an attacker.
Malware researchers (malware) Doina Cosovan and Octavian Minea of BitDefender said, because Trojan.Spy.YEK has both spy and backdoor features, it is a terrifying opponent.
" A spy malware in the company's intranet means dangerous. Unfortunately, the number of such threats is constantly increasing, " the researchers said.
" With a .dll file encoded in its overlay, this Trojan is easily stored in windowssystem32netconf32.dll and once infected with explorer.exe, nothing can stop it from connecting (whenever Which is necessary) with the attacker, "the researchers said.
Backdoor spyware (spyware)
" The backdoor component helps malware register itself as a service to receive and follow instructions from a command and control center, while the spyware component sends data about files, operating systems, and simultaneously. also made many screenshots of ongoing processes . "
Trojan.Spy.YEK searches all that is stored: e-mail (.eml, .dbx), address book (.wab), databases and documents (.doc, .odt,. pdf, .). That makes this Trojan the leading suspect of corporate espionage because it targets private data of companies.
Two researchers Cosovan and Minea said that Trojans can run no problem on all versions of Windows, from Windows 95 to Windows 7.
You should read it
- Appeared trojan trojan antivirus tool for mobile
- Trojan-Downloader_Win32_Agent.nmi
- Smartphone was attacked by ZeuS Trojan virus
- Again Trojan appeared to attack Mac OS
- Yusufali-A - trojan against 'black web'
- Appeared Trojan Horse virus attacks Mac computers
- The fake Trojan add-on Trojan is extremely dangerous
- Trojan-PSW.Win32.OnLineGames.rlh
May be interested
- Fix Internet connection after virus infectionthis is the most common case of computers after and after being infected with a virus. even if the virus is completely removed from the system, you still cannot connect to the internet.
- Instructions for removing fake Antimalware security softwarethis is one of the most dangerous variants of the winisoft series, and is also a copy of the system veteran malicious application.
- Instructions for removing counterfeit security software AntiSpyware Shield Procreated for the purpose of targeting the low-cost users, antispyware shield pro often comes with other malicious trojans and malware.
- Instructions for removing fake security software Antivirus PC 2009antivirus pc 2009 is also a fake antispyware security application, capable of spreading and multiplying extremely strongly
- Instructions to remove fake security program Cyber Securityin essence, this is a copy of the total security rogue program, and it's not too hard to remove
- Instructions for removing fake Internet Security 2010 softwareinternet security 2010 - aka is2010, is one of the members of the 'family' of advanced virus remover fake security software